Skip to content

S1227 StarProxy

StarProxy is custom malware used by Mustang Panda as a post-compromise tool, to enable proxying of traffic between the infected machine and other machines on the same network. 1

Item Value
ID S1227
Associated Names
Type MALWARE
Version 1.0
Created 21 July 2025
Last Modified 21 October 2025
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1059 Command and Scripting Interpreter StarProxy has used the command line for execution of commands.1
enterprise T1001 Data Obfuscation -
enterprise T1001.003 Protocol or Service Impersonation StarProxy has utilized TLS record headers in network packets to impersonate various versions of TLS protocols to blend in with legitimate network traffic. StarProxy used FakeTLS to communicate with its C2 server.1
enterprise T1140 Deobfuscate/Decode Files or Information StarProxy has decrypted network packets using a custom algorithm.1
enterprise T1573 Encrypted Channel -
enterprise T1573.001 Symmetric Cryptography StarProxy has leveraged two 256-byte XOR keys to encrypt and decrypt network packets using a custom algorithm.1
enterprise T1574 Hijack Execution Flow -
enterprise T1574.001 DLL StarProxy has been side-loaded by the legitimate, signed executable, IsoBurner.exe. 1
enterprise T1106 Native API StarProxy has used native windows API calls such as GetLocalTime() to retrieve system data.1
enterprise T1095 Non-Application Layer Protocol StarProxy has used TCP for C2 communications to target IPs or domains. StarProxy contained code to support both UDP and TCP connections.1
enterprise T1090 Proxy -
enterprise T1090.001 Internal Proxy StarProxy has proxied traffic between infected devices and their C2 servers.1
enterprise T1124 System Time Discovery StarProxy has utilized the windows API call GetLocalTime() to retrieve a SystemTime structure to generate a seed value.1

Groups That Use This Software

ID Name References
G0129 Mustang Panda 1

References